A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.
History

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 12:00:00 +0000


Mon, 16 Sep 2024 13:30:00 +0000


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-02-27T21:03:43.447Z

Reserved: 2023-07-25T10:15:36.274Z

Link: CVE-2023-3899

cve-icon Vulnrichment

Updated: 2024-08-02T07:08:50.678Z

cve-icon NVD

Status : Modified

Published: 2023-08-23T11:15:07.573

Modified: 2024-11-21T08:18:19.280

Link: CVE-2023-3899

cve-icon Redhat

Severity : Important

Publid Date: 2023-08-22T14:00:00Z

Links: CVE-2023-3899 - Bugzilla